#### Filter Results:

- Full text PDF available (205)

#### Publication Year

1992

2017

- This year (22)
- Last 5 years (73)
- Last 10 years (143)

#### Publication Type

#### Co-author

#### Journals and Conferences

Learn More

- Dan Boneh, Matthew K. Franklin
- CRYPTO
- 2001

We propose a fully functional identity-based encryption scheme (IBE). The scheme has chosen ciphertext security in the random oracle model assuming a variant of the computational DiffieHellmanâ€¦ (More)

- Dan Boneh, Ben Lynn, Hovav Shacham
- Journal of Cryptology
- 2001

We introduce a short signature scheme based on the Computational Diffieâ€“Hellman assumption on certain elliptic and hyperelliptic curves. For standard security parameters, the signature length isâ€¦ (More)

- Dan Boneh, Xavier Boyen
- EUROCRYPT
- 2004

We construct two efficient Identity Based Encryption (IBE) systems that are selective identity secure without the random oracle model in groups equipped with a bilinear map. Selective identity secureâ€¦ (More)

- Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, Giuseppe Persiano
- EUROCRYPT
- 2003

We study the problem of searching on data that is encrypted using a public key system. Consider user Bob who sends email to user Alice encrypted under Aliceâ€™s public key. An email gateway wants toâ€¦ (More)

- Dan Boneh, Xavier Boyen, Hovav Shacham
- CRYPTO
- 2004

We construct a short group signature scheme. Signatures in our scheme are approximately the size of a standard RSA signature with the same security. Security of our group signature is based on theâ€¦ (More)

- Dan Boneh, Craig Gentry, Ben Lynn, Hovav Shacham
- EUROCRYPT
- 2002

An aggregate signature scheme is a digital signature that supports aggregation: Given n signatures on n distinct messages from n distinct users, it is possible to aggregate all these signatures intoâ€¦ (More)

- Dan Boneh, James Shaw
- IEEE Trans. Information Theory
- 1998

This paper discusses methods for assigning codewords for the purpose of fingerprinting digital data, e.g., software, documents, music, and video. Fingerprinting consists of uniquely marking andâ€¦ (More)

- Dan Boneh, Xavier Boyen
- EUROCRYPT
- 2004

We describe a short signature scheme which is existentially unforgeable under a chosen message attack without using random oracles. The security of our scheme depends on a new complexity assumptionâ€¦ (More)

- Dan Boneh, Xavier Boyen, Eu-Jin Goh
- EUROCRYPT
- 2005

We present a Hierarchical Identity Based Encryption (HIBE) system where the ciphertext consists of just three group elements and decryption requires only two bilinear map computations, regardless ofâ€¦ (More)

- Dan Boneh, Eu-Jin Goh, Kobbi Nissim
- TCC
- 2005

Let Ïˆ be a 2-DNF formula on boolean variables x1, . . . , xn âˆˆ {0, 1}. We present a homomorphic public key encryption scheme that allows the public evaluation of Ïˆ given an encryption of theâ€¦ (More)